TECHNOLOGY > > Resilience


« Back to News

2022-04-22

Identity & Authentication For Mobile Users

For mobile users, there is a clear gap in the level of trust between the level of expectations from consumers versus real experience. By Dario Betti

2022-04-18

Types Of Security Testing Explained With Examples

Security testing encompasses all testing activities to ensure an application is correct and has faultless operation in a test environment.

2022-04-11

Mobile Cyber Attacks: The Different Facets Of Smartphone Malware

Vulnerable Banking Apps: Behavioural biometrics is the key to overcoming the challenge of advances in mobile malware. By Gemma Staite 

2022-03-26

Protecting Your Business From A Supply Chain Attack

Understanding how criminals operate makes it possible to protect your organization’s supply chain from cyber attacks. By Craig Moores

2022-03-30

Phishers Use Ukraine Invasion To Solicit Cryptocurrency

Malicious Emails: Phishers are impersonating legitimate aid organisations to steal donations intended for Ukrainian people. 

2022-03-23

Rated Cybersecurity Software & Tools

Powerful cyber security software is critical to meeting cyber security and compliance needs. Here are some of the best rated. By Charles Richard

2022-04-04

Improving The Security Of Open Source Software

Open Source Software has changed the world of IT and its popularity is growing fast - one of many reasons why it needs to be properly protected.

2022-10-11

In Many Cases Active Directory Is The Last Line Of Defence

Organisations of all sizes across every industry are failing to address Active Directory security gaps that leave them vulnerable to cyber attacks.

2022-03-28

Operating Technology Security Issues Are Increasing

Industrial control systems have become more connected than ever and good cyber security practices to protect Operating Technology are vital

2022-03-28

Only A Few Employees Cause The Majority Of Breaches

Research has found that 4% of employees clicked 80% of phishing links and that 3% were responsible for 92% of malware events.

2022-03-22

US Moves Cyber Defences To High Alert

Americans should ‘lock their digital doors’ to prepare for a Russian cyber attack as federal agencies and busineses are urged to remain vigilant.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

Center for Identity - University of Texas at Austin

Center for Identity - University of Texas at Austin

The mission of the Center is to deliver the highest-quality discoveries, applications, education, and outreach for excellence in identity management, privacy, and security.

Mvine

Mvine

Mvine's primary business is authoring and selling Cyber-Secure Platforms for Collaboration Portals and for Identity Management as well as delivering cloud support services.

Trustelem

Trustelem

Trustelem offers European and global companies a ready-to-use access management service that respects the principles of sovereignty, territoriality and privacy.

Thridwayv

Thridwayv

Thirdwayv helps your enterprise realize the full potential of loT connectivity. All while neutralizing security threats that can run ruin the customer experience - and your reputation.

IPification

IPification

IPification is a highly secure, credential-less, network-based authentication solution for frictionless user experience on mobile and IoT devices.

Defensity

Defensity

Defensity offer bespoke & pre packaged IT Security Solutions for Small business to help companies reduce overall IT related risk.

Spike Reply

Spike Reply

Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection.

UncommonX

UncommonX

UncommonX offers enterprise-class cybersecurity protection for mid-size organizations by combining adaptive threat and intelligence software with 24/7 industry experts.

Ciphertex Data Security

Ciphertex Data Security

Ciphertex is a leading data security company that specializes in portable data encryption and privacy protection storage systems.

Cyber Defense Technologies (CDT)

Cyber Defense Technologies (CDT)

Cyber Defense Technologies provides services and turn-key solutions to secure and maintain the integrity of your organization’s systems and data against attacks.

Digital Intelligence

Digital Intelligence

Digital Intelligence offer a full array of products, forensic and e-discovery consulting services and training.

ELLIO Technology

ELLIO Technology

ELLIO Technology is a cybersecurity company that reduces alert overload, improves incident response, and helps security teams target serious attackers who pose a real threat.

RedNode

RedNode

RedNode is a cybersecurity service provider that offers customized security testing solutions to protect any size of business worldwide.

CyFlare

CyFlare

CyFlare’s security platform integrates your tools with ours – delivering true positives, automated remediation, and interactive analytics built for security management teams.

American Binary

American Binary

American Binary is a Quantum Safe Networking (TM) and post-quantum encryption company.